Communication Theory of Secrecy Systems*
From MaRDI portal
Publication:3645296
Recommendations
Cited in
(only showing first 100 items - show all)- Image encryption using \(q\)-deformed logistic map
- An image encryption scheme based on quantum logistic map
- Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- How to build an ideal cipher: the indifferentiability of the Feistel construction
- A novel heuristic method for obtaining \(S\)-boxes
- A layered broadcast cryptographic system
- Fault tolerant deterministic quantum communications using GHZ states over collective-noise channels
- A block cipher based on a suitable use of the chaotic standard map
- An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps
- Logistic map as a block encryption algorithm
- An efficient quantum private comparison of equality over collective-noise channels
- Fast Correlation Attacks: Methods and Countermeasures
- Quantum authentication with key recycling
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Cryptographic analysis of all \(4 \times 4\)-bit s-boxes
- Symmetric Ciphers Based on Two-Dimensional Chaotic Maps
- Security analysis of some diffusion mechanisms used in chaotic ciphers
- Nonlinearities of S-boxes
- Probabilistic encryption
- A new chaotic algorithm for image encryption
- Image encryption with chaotically coupled chaotic maps
- Algebraic nonlinearity and its applications to cryptography
- A method for designing dynamical S-boxes based on discretized chaotic map
- A novel method for designing S-boxes based on chaotic maps
- Bell state entanglement swappings over collective noises and their applications on quantum cryptography
- Comment on: ``Three-party quantum secure direct communication based on GHZ states
- Conditionally-perfect secrecy and a provably-secure randomized cipher
- Search-based chaotic pseudorandom bit generator
- Lessons learnt from the cryptanalysis of chaos-based ciphers
- Jarzynski-type equalities in gambling: role of information in capital growth
- Quantum key agreement against collective decoherence
- New bounds and constructions for authentication/secrecy codes with splitting
- Formalization of Shannon's theorems
- A synthetic indifferentiability analysis of some block-cipher-based hash functions
- On privacy preserving data release of linear dynamic networks
- SOME BASIC CRYPTOGRAPHIC REQUIREMENTS FOR CHAOS-BASED CRYPTOSYSTEMS
- New field of cryptography: DNA cryptography
- A construction of novel chaos base nonlinear component of block cipher
- Decoy-state quantum key distribution with a leaky source
- A construction of a cipher from a single pseudorandom permutation.
- A method for designing strong S-Boxes based on chaotic Lorenz system
- Image security system using recursive cellular automata substitution
- A chaotic image encryption scheme owning temp-value feedback
- On an Almost-Universal Hash Function Family with Applications to Authentication and Secrecy Codes
- Keyed hash function based on a chaotic map
- THE PHYSICS OF QUANTUM INFORMATION: COMPLEMENTARITY, UNCERTAINTY, AND ENTANGLEMENT
- Quantum dialogue protocols immune to collective noise
- Fault tolerant quantum key distributions using entanglement swapping of GHZ states over collective-noise channels
- Controlled bidirectional quantum secure direct communication with six-qubit entangled states
- A block cipher with dynamic S-boxes based on tent map
- Analysis on security loophole of two-step efficient quantum dialogue with three-particle entangled W state
- Analysis and improvement of a chaos-based hash function construction
- Secret sharing over infinite domains
- Algebraic attacks using binary decision diagrams
- Quantum permutation pad for universal quantum-safe cryptography
- Chaotic encryption using discrete-time synchronous chaos
- Algebraic Cryptanalysis of the Data Encryption Standard
- A novel image encryption algorithm based on a 3D chaotic map
- A fast image encryption and authentication scheme based on chaotic maps
- Image encryption using chaotic coupled map lattices with time-varying delays
- Enumerating Boolean functions of cryptographic significance
- Image encryption using DNA addition combining with chaotic maps
- Quantum correlation with entanglement and mutual entropy
- Applications of tripled chaotic maps in cryptography
- ON THE DYNAMICAL DEGRADATION OF DIGITAL PIECEWISE LINEAR CHAOTIC MAPS
- Improvement of quantum dialogue based on entanglement swapping and Hadamard operation via cavity QED
- SECURITY OF QUANTUM KEY DISTRIBUTION
- Color image encryption based on one-time keys and robust chaotic maps
- Hash function based on piecewise nonlinear chaotic map
- A new image encryption scheme based on a simple first-order time-delay system with appropriate nonlinearity
- A structure-based chaotic hashing scheme
- Chaotic map-embedded Blowfish algorithm for security enhancement of colour image encryption
- A symmetric image encryption scheme based on 3D chaotic cat maps
- Chaos-based diffusion for highly autocorrelated data in encryption algorithms
- Chaotic hash function based on the dynamic S-box with variable parameters
- Quantum multi-proxy strong blind signature based on block blind coding
- A chaotic map-control-based and the plain image-related cryptosystem
- An efficient diffusion scheme for chaos-based digital image encryption
- Quantum authencryption with two-photon entangled states for off-line communicants
- Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure
- Is the data encryption standard a group? (Results of cycling experiments on DES)
- Unconditionally secure quantum signatures
- Two new controlled not gate based quantum secret sharing protocols without entanglement attenuation
- Design of image cipher using Latin squares
- Differentially 4-uniform bijections by permuting the inverse function
- Cryptanalysis of a new circular quantum secret sharing protocol for remote agents
- Robust quantum dialogue based on the entanglement swapping between any two logical Bell states and the shared auxiliary logical Bell state
- Prediction, retrodiction, and the amount of information stored in the present
- Algebraic analysis of a RGB image encryption algorithm based on DNA encoding and chaotic map
- Three-party semi-quantum protocol for deterministic secure quantum dialogue based on GHZ states
- The structured design of cryptographically good s-boxes
- Enhanced Boolean functions suitable for the filter model of pseudo-random generator
- Information leakage resistant quantum dialogue with single photons in both polarization and spatial-mode degrees of freedom
- Latin squares over Abelian groups
- QUANTUM KEY-DISTRIBUTION PROTOCOL FOR N-BIT SECRET MESSAGE COMMUNICATION
- IRREGULARLY DECIMATED CHAOTIC MAP(S) FOR BINARY DIGITS GENERATIONS
- Practical Algebraic Attacks on the Hitag2 Stream Cipher
- Group theoretic properties of Rijndael-like ciphers
- Improved quantum `ping-pong protocol based on five-qubit GHZ state and classical CNOT operation
This page was built for publication: Communication Theory of Secrecy Systems*
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3645296)